CN111541544A - Quantum digital signature method based on double-field protocol - Google Patents

Quantum digital signature method based on double-field protocol Download PDF

Info

Publication number
CN111541544A
CN111541544A CN202010200419.7A CN202010200419A CN111541544A CN 111541544 A CN111541544 A CN 111541544A CN 202010200419 A CN202010200419 A CN 202010200419A CN 111541544 A CN111541544 A CN 111541544A
Authority
CN
China
Prior art keywords
bob
alice
charlie
signature
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010200419.7A
Other languages
Chinese (zh)
Other versions
CN111541544B (en
Inventor
张春辉
王琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202010200419.7A priority Critical patent/CN111541544B/en
Publication of CN111541544A publication Critical patent/CN111541544A/en
Application granted granted Critical
Publication of CN111541544B publication Critical patent/CN111541544B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The invention aims to provide a quantum digital signature method based on a double-Field protocol, which utilizes a double-Field key generation protocol (TF-KGP, two-Field KGP) to complete the generation and distribution of a key in the key distribution stage of quantum digital signature, and a user sends a quantum state to a special measuring party for measurement without the need of obtaining the credibility of the measuring party. From the perspective of safety, the quantum digital signature system has the irrelevant property of the measuring equipment due to the use of the TF-KGP, can resist side channel attack aiming at the measuring equipment, and improves the safety of the quantum digital signature system; from the practical point of view, under the same parameter condition, the number of the secret keys which can be used for signature is greatly increased, so that the safe transmission distance of the signature and the signature rate at a remote position are improved, and the practical performance of the quantum digital signature system is improved.

Description

Quantum digital signature method based on double-field protocol
Technical Field
The invention relates to the technical field of quantum information technology and network information security, in particular to a quantum digital signature method based on a double-field protocol.
Background
Digital signatures are one of the most important cryptographic protocols and have wide application in verifying the authenticity and integrity of digital documents such as financial transactions and electronic contracts. Current digital signatures (hereinafter referred to as classical digital signatures) can only provide security based on computational complexity. For example, the security of the RSA algorithm relies on the large number factorization problem, while the elliptic curve algorithm relies on the computational difficulty of discrete logarithms. However, with the development of mathematical algorithms and the advent of quantum computers, these classical digital signature algorithms will eventually be broken.
The security of Quantum Digital Signature (QDS) is based on the Quantum mechanical law, and can provide security in the aspect of information theory. Since the first QDS protocol was proposed in 2001, researchers have eliminated many practical obstacles such as quantum memory, secure quantum channels, etc. Meanwhile, scientific researchers propose that a quantum Key distribution Protocol can be used as a Key Generation Protocol (KGP) in the QDS, and the experiment implementation difficulty of the QDS is reduced. In addition, the Measurement Device-dependent quantum digital signature (MDI-QDS) protocol can immunize any side channel attack against the Measurement Device. However, the conventional QDS protocol is difficult to satisfy both security and practicability, and has certain limitations. For example, the BB84 type QDS (BB84-QDS) protocol has a high signature rate, but cannot resist side channel attack on a measuring end, and has low security; the MDI-QDS protocol has higher security, but has a very limited signature rate. Most importantly, KGP in both types of QDS protocols cannot break the linear bound between key generation rate and distance when no quantum repeater is used, which is an upper bound determined by channel capacity.
Disclosure of Invention
The invention aims to provide a quantum digital signature method based on a double-Field protocol, which utilizes a double-Field key generation protocol (TF-KGP, two-Field KGP) to complete the generation and distribution of a key in the key distribution stage of quantum digital signature, and a user sends a quantum state to a special measuring party for measurement without the need of obtaining the credibility of the measuring party. Due to the use of the TF-KGP, the security irrelevant to the measuring equipment is possessed, and side channel attack aiming at the measuring equipment can be resisted; in addition, compared with BB84-QDS and MDI-QDS, the invention greatly improves the transmission distance of the signature and the signature rate at a long distance.
The invention provides a quantum digital signature method based on a double-field protocol, which adopts the double-field protocol to generate and sign a secret key and is applied to a Quantum Digital Signature (QDS) transmission system, the method comprises a secret key distribution stage and an information stage, wherein the secret key distribution stage comprises user parties Alice, Bob, Charlie and a measuring party Eve, in the secret key distribution stage, Alice, Bob and Charlie are quantum state senders, and Eve is a quantum state receiving and measuring party; the key distribution phase comprises the following three steps:
the method comprises the following steps: respectively sending the quantum state to Eve for measurement by Alice and Bob, Alice and Charlie, generating an original key by using a double-field key generation protocol, randomly selecting part of bits from the original keys held by Alice and Bob, and using the rest of bits as a key pool for signature; defining the lengths of the original key, the error rate detection and the key pool as n respectivelyZ、ntestAnd npool(ii) a The quantum channel formed among Alice, Eve and Bob is considered as Alice-Bob, the quantum channel formed among Alice, Eve and Charlie is considered as Alice-Charlie, and the error rate of Alice-Bob is defined as
Figure BDA0002419174200000031
Alice-Charlie with a bit error rate of
Figure BDA0002419174200000032
Step two: and signing the message m, wherein m is 0 or 1, and Alice and Bob or Alice and Charlie respectively select bit strings with the length of L from a key pool of the message m, and the bit strings selected by Alice and Bob are respectively recorded as
Figure BDA0002419174200000033
And
Figure BDA0002419174200000034
the bit strings selected by Alice and Charlie are respectively
Figure BDA0002419174200000035
And
Figure BDA0002419174200000036
step three: bob and Charlie from
Figure BDA0002419174200000037
And
Figure BDA0002419174200000038
randomly selecting one half of reserved bits, and exchanging the other half of bits and bit position information through a secure private channel between the two bits; let Bob reserve bit information as
Figure BDA0002419174200000039
The bit information sent to Charlie is
Figure BDA00024191742000000310
Let Charlie retain bit information as
Figure BDA00024191742000000311
The bit information sent to Bob is
Figure BDA00024191742000000312
After the exchange, Bob's key string is
Figure BDA00024191742000000313
Charlie has a key string of
Figure BDA00024191742000000314
In the information phase, Alice serves as a signer, and Bob and Charlie serve as verifiers, namely a signer receiving party; the information phase comprises the following four steps:
step four: alice signs the information (m, Sig)m) Sent to Bob, where SigmRepresenting the signature on the message m,
Figure BDA00024191742000000315
step five: bob will receive the signature (m, Sig)m) And
Figure BDA00024191742000000316
comparing if
Figure BDA00024191742000000317
In (1)
Figure BDA00024191742000000318
Respectively with signature
Figure BDA00024191742000000319
The number of mismatching of the corresponding position bits is less than saL/2, Bob accepts the signature and carries out the next step, otherwise refuses the signature and ends the protocol flow; wherein,
Figure BDA00024191742000000320
Figure BDA00024191742000000321
is a key string
Figure BDA00024191742000000322
Upper limit of error rate, PeFor minimum rate P introducing errors in key generation process in the presence of an eavesdroppere
Step six: bob will sign the information (m, Sig)m) Sending the information to Charlie;
step seven: charlie will receive signature information (m, Sig)m) And
Figure BDA0002419174200000041
making a comparison if
Figure BDA0002419174200000042
In
Figure BDA0002419174200000043
Respectively with signature
Figure BDA0002419174200000044
The number of unmatched bits of corresponding position is less than svL/2, Charlie accepts this signature, otherwiseReject the signature; wherein,
Figure BDA0002419174200000045
sv>sa
the further improvement lies in that: in the presence of an eavesdropper Eve, the key string
Figure BDA0002419174200000046
The minimum entropy of (a) is:
Figure BDA0002419174200000047
wherein,
Figure BDA0002419174200000048
and H2Are binary shannon entropy functions, satisfy: h (x) xlog2(x)-(1-x)log2(1-x); oa is the failure probability for parameter estimation, E denotes the eavesdropper Eve, andn L,1and
Figure BDA0002419174200000049
are respectively a key string
Figure BDA00024191742000000410
The lower bound of the single photon counting and the upper bound of the single photon error rate, wherein U is B or C and represents a user Bob or Charlie.
The further improvement lies in that: when an eavesdropper Eve exists, the Eve pairs the key string in the key generation process
Figure BDA00024191742000000411
Minimum rate P of introduced error codeeComprises the following steps:
Figure BDA00024191742000000412
the further improvement lies in that: in the key distribution stage, the bits are generated by using TF-KGP by Alice and Bob, Alice and Charlie respectively, wherein the Alice and Bob or Alice and Charlie respectively send quantum states to a measuring party Eve, and the Eve measures the received quantum states.
The invention has the beneficial effects that: compared with the conventional QDS scheme, the scheme of the invention adopts the double-field key generation protocol at the key distribution stage, and the double-field key generation protocol can break the linear boundary between the conventional key rate and distance, so that the key which can be used for signature under the condition of meeting the given security is greatly increased, and the signature rate and the transmission distance of the quantum digital signature are improved; the invention has the property of independence of the measuring equipment, and can resist the attack to the measuring equipment, thereby ensuring the high security of the quantum digital signature system. The simulation result shows that the method has good performance in all aspects.
Drawings
FIG. 1 is a schematic diagram of the present invention.
Fig. 2 is a graph of the size of the medium key pool, the length of the half-bit signature, and the number of signature bits as a function of distance in accordance with the present invention.
FIG. 3 is a graph comparing the signature rate of the present invention with other schemes.
Fig. 4 is a graph of the relationship between the signature rate and the local bit error rate under different security in the present invention.
Detailed Description
For the purpose of enhancing understanding of the present invention, the present invention will be further described in detail with reference to the following examples, which are provided for illustration only and are not to be construed as limiting the scope of the present invention. The following describes the scheme of the present invention by taking a specific TF-KGP as an example, namely, the Sending or non-Sending dual field key generation protocol (SNS TF-KGP, Sending-or-Not-Sending TF-KGP). Meanwhile, the TF-QDS method is suitable for different types of TF-KGP protocols and is not limited to SNSTF-KGP protocols.
The contents of the TF-QDS protocol will be described in detail below:
a distribution stage: in the distribution stage, Alice, Bob and Charlie are the quantum state senders, Eve is the quantum state receiving measurer, and the distribution stage comprises the following steps:
(1) respectively generating N pulses by Alice-Bob/Alice-Charlie, encoding the pulses by using a strength modulator and a phase modulator, and then sending the pulses to Eve; during the encoding process, the number of the coding sequences is 1-p respectivelyZAnd pZIs random with probabilitySelecting a decoy state window and a signal state window to encode the pulse, wherein the two windows are respectively marked as an X window and a Z window; under the X window, each side of Alice and Bob is denoted by pxRandom preparation of (2) sends a coherent state of intensity x, phase θ, where x ∈ {0, w, v }, x ∈ [0,2 π [ ]]Under the Z window, with psA signal state with a probability of transmission strength u, a probability of non-transmission 1-ps(ii) a Taking Alice and Bob as examples, the coherent states prepared respectively can be characterized as follows:
Figure BDA0002419174200000061
where n is the number of photons in the pulse, xAAnd xBIntensity, θ, used by Alice and Bob, respectivelyAAnd thetaBPhases prepared for Alice and Bob, respectively;
(2) eve uses a beam splitter and two detectors to perform projection measurement on the received pulse pair, and publishes the detection result, if only one of the two detectors responds, the event is recorded as a successful response event; two detectors are respectively marked as D0,D1
(3) Alice-Bob/Alice-Charlie publicly announced that for the type of window they used for each pulse, only the measurements that were successful for them were retained, successful measurements being the successful response event of Eve when they used the same type of window, i.e. both X-windows or Z-windows; if they all use the X window, then the phase and decoy state strength of each pulse need to be published; in addition, a valid measurement result under an X window needs to be selected later, which is defined as (taking Alice-Bob as an example): both Alice and Bob used an X-window, the same intensity and phase for successful response events that satisfied the following condition:
Figure BDA0002419174200000062
wherein psiABIs the overall phase difference between Alice-to-Eve and Bob-to-Eve channels, which results in local bit errors edK is 0 or 1 represents AliThe phases of ce and Bob are in-phase or out-of-phase,
Figure BDA0002419174200000071
representing the size of a preset phase plate, wherein M is the number of the phase plates;
(4) Alice-Bob/Alice-Charlie generates an original key by using data under a Z window, and the generation rule is as follows (taking Alice and Bob as an example): for the successful measurement result under the Z window, if Alice sends a signal state, the signal state is recorded as 1, if not, the signal state is recorded as 0, otherwise, Bob; estimating channel parameters by using data under an X window, wherein correct and wrong response events in effective measurement results under the X window are as follows: for valid measurement results under the X window, the detector D when the correct response event is k 00Detector D with response or k 11In response, the detector D responds when the wrong response event is that k is 01Detector D with response or k 10Responding; in addition, they sacrifice the ratio r below the Z window at randomETCarrying out error rate detection on the bits, and using the rest bits as a signature key pool; the lengths of the original key, the error rate detection and the key pool are n respectivelyZ、ntestAnd npoolThe bit error rate of Alice-Bob is
Figure BDA0002419174200000072
Alice-Charlie with a bit error rate of
Figure BDA0002419174200000073
(5) For the signature message m (m is 0 or 1), Alice and Bob, Alice and Charlie respectively select a bit string with the length of L from their key pools; let the bit strings selected by Alice and Bob be respectively
Figure BDA0002419174200000074
And
Figure BDA0002419174200000075
bit string selected by Alice and Charlie as
Figure BDA0002419174200000076
And
Figure BDA0002419174200000077
(6) bob and Charlie from
Figure BDA0002419174200000078
And
Figure BDA0002419174200000079
randomly selecting one half of reserved bits, and exchanging the other half of bits and bit position information through a secure private channel between the two bits; let Bob reserve bit information as
Figure BDA00024191742000000710
The bit information sent to Charlie is
Figure BDA00024191742000000711
Let Charlie retain bit information as
Figure BDA00024191742000000712
The bit information sent to Bob is
Figure BDA00024191742000000713
After the exchange, Bob's key string is
Figure BDA00024191742000000714
Charlie has a key string of
Figure BDA00024191742000000715
An information stage: in the information phase, Alice is used as a signer, Bob and Charlie are used as verifiers, and the information phase comprises the following steps:
(7) alice signs the information (m, Sig)m) Sent to Bob, where SigmRepresenting the signature on the message m,
Figure BDA0002419174200000081
(8) bob will receive the signature (m),Sigm) And
Figure BDA0002419174200000082
comparing if
Figure BDA0002419174200000083
Are respectively connected with
Figure BDA0002419174200000084
The number of mismatching of the corresponding position bits is less than saL/2, Bob accepts the signature and carries out the next step, otherwise refuses the signature and terminates the protocol flow; wherein,
Figure BDA0002419174200000085
Figure BDA0002419174200000086
is a key string
Figure BDA0002419174200000087
Upper limit of error rate, PeMinimum rate P for introducing errors in key generation process in the presence of eavesdroppere
(9) Bob will (m, Sig)m) Sending the information to Charlie;
(10) charlie will receive signature information (m, Sig)m) And
Figure BDA0002419174200000088
making a comparison if
Figure BDA0002419174200000089
Are respectively connected with
Figure BDA00024191742000000810
The number of mismatching of the corresponding position bits is less than svL/2, the Charlie accepts the signature, otherwise, the Charlie rejects the signature; wherein,
Figure BDA00024191742000000811
sv>sa
definition PabThe probability with the strength of a and b is respectively sent by two parties carrying out TF-KGP under an X window,
Figure BDA00024191742000000812
is the probability of sending a valid event under the window X, where a, b ∈ {0, w, v }. two probabilities can be characterized as:
Figure BDA00024191742000000813
the number of pulses correspondingly transmitted is Nab=PabN,
Figure BDA00024191742000000814
Similarly, both parties performing TF-KGP select the number of pulses in the Z window as
Figure BDA00024191742000000815
Definition of nZThe count under the Z window obtained by measurement in the TF-KGP process, i.e. the number of the original keys, can be characterized by the following size:
Figure BDA0002419174200000091
wherein,
Figure BDA0002419174200000092
is the penetration of the channel, ηdα is the loss coefficient of the channel for the detection efficiency of the detector, thetaAU=θAUAnd preparing phase difference for the TF-KGP. Definition of nabFor the counts of the TF-KGP two sides with the intensity combination of a and b under the X window, the required intensity combination for estimating the single photon count is {00,0w, w0,0v, v0}, and the counts can be characterized as follows:
n00=2Pdc(1-Pdc)N00, (5)
n0w=nw0=2[(1-Pdc)eηw/2-(1-Pdc)2e-ηw]N0w, (6)
n0v=nv0=2[(1-Pdc)eηv/2-(1-Pdc)2e-ηv]N0v, (7)
wherein, PdcIs the dark count rate of the detector. In addition, m is definedaaThe number of response events of errors under an X-base window, namely error code counting, is used for estimating the error rate of a single photon, and can be characterized as follows:
Figure BDA0002419174200000093
by using the count value in the formula (5-8), we can estimate that the lower bound of the single photon count and the single photon error code count under the X window are respectively:
Figure BDA0002419174200000094
Figure BDA0002419174200000095
wherein, tauX,1The probability of all single photon components under an X window during transmission can be characterized as follows:
Figure BDA0002419174200000096
Figure BDA0002419174200000097
and
Figure BDA0002419174200000098
are each nabThe upper and lower bounds after statistical fluctuation are considered,
Figure BDA0002419174200000099
and
Figure BDA00024191742000000910
are respectively maaThe upper and lower bounds after statistical fluctuations are considered. For example, for the variable χ, the upper and lower bounds after accounting for statistical fluctuations using the Hoeffding inequality are:
χ+=χ+(χ,SF),χ-=χ-(χ,SF), (12)
Figure BDA0002419174200000102
wherein oa isSFThe probability of failure in statistical fluctuations is taken into account for a certain observation.
Lower bound of single photon counting using X-windown X,1And upper bound of single photon error code counting
Figure BDA0002419174200000103
The lower bound of the single photon counting number and the upper bound of the single photon error code counting number in the original key under the Z window can be estimated by using the Serfling inequality, and the estimation relationship is as follows:
Figure BDA0002419174200000104
Figure BDA0002419174200000105
wherein
Figure BDA0002419174200000106
N Z,1Is the lower bound of the number of single photons under the transmit end Z window,
Figure BDA0002419174200000107
which is an upper bound on the number of single photons under the X window of the transmitting end, they can be characterized as:
N Z,1=2ps(1-ps)ue-uNZ-(NZSF), (16)
Figure BDA0002419174200000108
the failure probabilities of the formulae (14-15) are all oaSFAccording to the two formulas, the single photon error rate under the Z window is obtained as follows:
Figure BDA0002419174200000109
the lower bound of single photon counting in the original key and the upper bound of single photon error rate are respectivelyn Z,1And
Figure BDA00024191742000001010
the key string can be estimated by using the Serfling inequality
Figure BDA00024191742000001011
The lower bound of single photon counting and the upper bound of single photon error rate have the following estimation relationship:
Figure BDA0002419174200000111
Figure BDA0002419174200000112
wherein
Figure BDA0002419174200000113
According to the single photon counting lower bound and the single photon error rate upper bound estimated by the formula (19-20), the key string can be obtained under the condition that an eavesdropper Eve exists
Figure BDA0002419174200000114
The minimum entropy of (a) is:
Figure BDA0002419174200000115
wherein,
Figure BDA0002419174200000116
and H2Are binary shannon entropy functions, satisfy: h (x) xlog2(x)-(1-x)log2(1-x); oa is the failure probability for parameter estimation, E denotes the eavesdropper Eve. Eve pairs key string in TF-KGP process
Figure BDA0002419174200000117
Minimum rate P of introducing error codeeComprises the following steps:
Figure BDA0002419174200000118
aiming at the safety analysis of TF-QDS, the scheme of the invention comprehensively considers the robustness probability, the false probability and the repudiation probability. The robustness probability is the failure probability of the protocol when the system normally operates, and the key string is estimated mainly by the detected error rate
Figure BDA0002419174200000119
The estimation relation caused by the failure of the medium bit error rate is as follows:
Figure BDA00024191742000001110
the estimated failure probability is oaPETwo TF-KGP processes of Alice-Bob and Alice-Charlie
Figure BDA00024191742000001111
Has an upper bound on the error rate of
Figure BDA00024191742000001112
Therefore, the robustness probability of TF-QDS is:
P(Robust)2òPE。 (24)
the probability of denial is a measure of the probability that Alice's signature is accepted by Bob but rejected by Charlie. For repudiation, Alice needs to have her issued signature (m, Sig)m) And
Figure BDA0002419174200000121
mismatch ratio of two partsIs less than saTo and with
Figure BDA0002419174200000122
The mismatching rate of the two parts is higher than sv. Thus, the probability of denial is:
Figure BDA0002419174200000123
wherein
Figure BDA0002419174200000124
The probability of forgery is a measure of the probability that Bob falsely makes Alice's signature acceptable to Charlie. In order to forge a signature, Bob needs a signature (m, Sig) that makes him forgedm) And
Figure BDA0002419174200000125
in
Figure BDA0002419174200000126
Has a mismatch rate lower than sv. Hence the probability of forgery contains Bob's guesses
Figure BDA0002419174200000127
Probability of failure for all procedures:
Figure RE-GDA0002573042950000128
g and oaFError rate with Bob forged signature is less than svIs g a predetermined constant probability, oa is a predetermined probability of being constantFIs defined as:
Figure RE-GDA0002573042950000129
Figure BDA00024191742000001210
and
Figure BDA00024191742000001211
are respectively estimated parametersn L,1And
Figure BDA00024191742000001212
the probability of failure of (c). In summary, the security of the protocol needs to be satisfied
max{P(Robust),P(Repudiation),P(Forge)}。 (28)
To measure the performance of the TF-QDS protocol, the number of signature bits n of the protocol is definedbitsAnd the signature rate R is:
Figure BDA00024191742000001213
Figure BDA00024191742000001214
in order that the objects, aspects and advantages of the present invention will become more apparent, the invention will be further described in detail with reference to the accompanying drawings.
In the simulation scheme of the invention, the number M of the phase plates is 16, and other used system parameters are shown in the table I, wherein α is the loss coefficient of the quantum channel, ηdAnd PdcThe detection efficiency and the dark count rate of the detector are respectively; e.g. of the typedThe background bit error rate of the optical system; r isETSelecting the proportion for carrying out error rate detection in the original key; oaPEAnd oaSFRespectively the failure probability of the error rate estimation and the failure probability of the statistical fluctuation estimation; g is the probability associated with forgery. In addition, under the given security size, the signature rate of the TF-QDS is subjected to full-parameter optimization, and the optimized parameters comprise: strength of spoofed state w, v and corresponding probability of selection pw,pvSelection probability p of Z windowZThe strength u of the signal state and the transmission probability ps
TABLE I
α ηd Pdc ed rET òPE òSF g
0.2dB/km 50% 10-7 0.03 5.5% 10-12 10-12 10-12
Fig. 2 first shows that the pulse number N is 1013Security of 10-5Time, key pool size n in TF-QDSpoolLength L required by signature half bit and signature bit number nbitsTrend with transmission distance. It can be seen from the figure that at greater than 250km, the length required to sign a half bit increases dramatically with increasing distance, while the number of bits that can be signed decreases dramatically. This indicates that at long distances, the impact of the finite length effect increases rapidly, requiring a longer key amount to securely sign half bits。
FIG. 3 shows that the pulse number is N-1013Or N1015Security of 10-5The signature rate of TF-QDS is plotted against the signature rate of the other two representative schemes. These two protocols are BB84-QDS and MDI-QDS, BB84-QDS from the literature [ R.Amiri, P.Wallden, A. Kent, and E.Andersson, Secure quantum signatures using the same quantum channels, Phys.Rev.A 93,032325(2016)]MDI-QDS from the literature [ I.V.Puthoor, R.Amiri, P.Wallden, M.Current, and E.Andersson, Measurement-device-independent rectangle derivatives, Phys.Rev.A 94,022328(2016)]. For fair comparison, the signature rates for these two schemes in simulation also use the parameters in table I and are optimized for full parameters. As can be seen from FIG. 3, the TF-QDS has a far-beyond transmission distance of BB84-QDS and MDI-QDS and a far-distance signature rate. The BB84-QDS has a higher signature rate at close range, but has a low security level and cannot resist side channel attacks against the measuring device. Furthermore, it can be seen that the TF-QDS is affected by a finite length between BB84-QDS and MDI-QDS.
FIG. 4 shows that N is 10 at 50km13Security of 10-5Or 10-10And (3) the trend that the signature rate of the TF-QDS changes along with the background bit error rate. As can be seen, the TF-QDS can tolerate 18% of the background error rate under the condition, which is far beyond the sustainable background error rate of BB84-QDS and MDI-QDS. Furthermore, a higher security level means that a certain signature rate will be sacrificed.
In summary, the present invention proposes a quantum digital signature method based on a two-field protocol, and has been described in detail using a send-or-not two-field key generation protocol as a specific example. The specific simulation proves that the QDS system using the method can simultaneously take safety and practicability into consideration, namely, the QDS system has the independent safety level of the measuring equipment and is obviously improved in the aspects of safe transmission distance and signature efficiency compared with the existing QDS protocol.
The above description is only of the preferred embodiments of the present invention, and it should be noted that: it will be apparent to those skilled in the art that various modifications and enhancements may be made without departing from the principles of the invention by using different two-field protocols, different spoofing methods, different finite length effects, different light sources, different implementation architectures (system-on-chip, free space system, fiber optic system, etc.), and the like, and such modifications and enhancements are also considered to be within the scope of the invention.

Claims (4)

1. A quantum digital signature method based on a double-field protocol is characterized in that: the method adopts a double-field protocol to generate and sign a secret key, is applied to a Quantum Digital Signature (QDS) transmission system, and comprises a secret key distribution stage and an information stage, wherein the secret key distribution stage comprises user parties including Alice, Bob, Charlie and a measuring party Eve, in the secret key distribution stage, Alice, Bob and Charlie are quantum state sending parties, and Eve is a quantum state receiving and measuring party; the key distribution phase comprises the following three steps:
the method comprises the following steps: respectively sending the quantum state to Eve for measurement by Alice and Bob, Alice and Charlie, generating an original key by using a double-field key generation protocol, randomly selecting part of bits from the original keys held by Alice and Bob, and using the rest of bits as a key pool for signature; defining the lengths of the original key, the error rate detection and the key pool as n respectivelyZ、ntestAnd npool(ii) a The quantum channel formed among Alice, Eve and Bob is considered as Alice-Bob, the quantum channel formed among Alice, Eve and Charlie is considered as Alice-Charlie, and the error rate of Alice-Bob is defined as
Figure FDA0002419174190000011
Alice-Charlie with a bit error rate of
Figure FDA0002419174190000012
Step two: and signing the message m, wherein m is 0 or 1, and Alice and Bob or Alice and Charlie respectively select bit strings with the length of L from a key pool of the message m, and the bit strings selected by Alice and Bob are respectively recorded as
Figure FDA0002419174190000013
And
Figure FDA0002419174190000014
the bit strings selected by Alice and Charlie are respectively
Figure FDA0002419174190000015
And
Figure FDA0002419174190000016
step three: bob and Charlie from
Figure FDA0002419174190000017
And
Figure FDA0002419174190000018
randomly selecting one half of reserved bits, and exchanging the other half of bits and bit position information through a secure private channel between the two bits; let Bob reserve bit information as
Figure FDA0002419174190000019
The bit information sent to Charlie is
Figure FDA0002419174190000021
Let Charlie retain bit information as
Figure FDA0002419174190000022
The bit information sent to Bob is
Figure FDA0002419174190000023
After the exchange, Bob's key string is
Figure FDA0002419174190000024
Charlie has a key string of
Figure FDA0002419174190000025
In the information phase, Alice serves as a signer, and Bob and Charlie serve as verifiers, namely a signer receiving party; the information phase comprises the following four steps:
step four: alice signs the information (m, Sig)m) Sent to Bob, where SigmRepresenting the signature on the message m,
Figure FDA0002419174190000026
step five: bob will receive the signature (m, Sig)m) And
Figure FDA0002419174190000027
comparing if
Figure FDA0002419174190000028
In (1)
Figure FDA0002419174190000029
Respectively with signature
Figure FDA00024191741900000210
The number of mismatching of the corresponding position bits is less than saL/2, Bob accepts the signature and carries out the next step, otherwise refuses the signature and terminates the protocol flow; wherein,
Figure FDA00024191741900000211
Figure FDA00024191741900000212
is a key string
Figure FDA00024191741900000213
Upper limit of error rate, PeMinimum rate P for introducing errors in key generation process in the presence of eavesdroppere
Step six: bob sends the signature information (m,Sigm) Sending the information to Charlie;
step seven: charlie will receive signature information (m, Sig)m) And
Figure FDA00024191741900000214
making a comparison if
Figure FDA00024191741900000215
In
Figure FDA00024191741900000216
Respectively with signature
Figure FDA00024191741900000217
The number of mismatching of the corresponding position bits is less than svL/2, the Charlie accepts the signature, otherwise, the Charlie rejects the signature; wherein,
Figure FDA00024191741900000218
2. a quantum digital signature method based on a two-field protocol as claimed in claim 1 wherein: in the presence of an eavesdropper Eve, the key string
Figure FDA00024191741900000219
The minimum entropy of (a) is:
Figure FDA00024191741900000220
wherein,
Figure FDA00024191741900000221
and H2Are binary shannon entropy functions, satisfy: h (x) xlog2(x)-(1-x)log2(1-x); oa is the failure probability for parameter estimation, E denotes the eavesdropper Eve, and nL,1And
Figure FDA0002419174190000031
are respectively a key string
Figure FDA0002419174190000032
The lower bound of single photon counting and the upper bound of single photon error rate, wherein U is B or C, and represents the user Bob or Charlie.
3. A quantum digital signature method based on a two-field protocol as claimed in claim 2, characterized in that: when an eavesdropper Eve exists, the Eve pairs the key string in the key generation process
Figure FDA0002419174190000033
Minimum rate P of introduced error codeeComprises the following steps:
Figure FDA0002419174190000034
4. a quantum digital signature method based on a two-field protocol as claimed in claim 1 wherein: in the key distribution stage, the bits are generated by using TF-KGP by Alice and Bob, Alice and Charlie respectively, wherein the Alice and Bob or Alice and Charlie respectively send quantum states to a measuring party Eve, and the Eve measures the received quantum states.
CN202010200419.7A 2020-03-20 2020-03-20 Quantum digital signature method based on double-field protocol Active CN111541544B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010200419.7A CN111541544B (en) 2020-03-20 2020-03-20 Quantum digital signature method based on double-field protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010200419.7A CN111541544B (en) 2020-03-20 2020-03-20 Quantum digital signature method based on double-field protocol

Publications (2)

Publication Number Publication Date
CN111541544A true CN111541544A (en) 2020-08-14
CN111541544B CN111541544B (en) 2023-06-02

Family

ID=71976742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010200419.7A Active CN111541544B (en) 2020-03-20 2020-03-20 Quantum digital signature method based on double-field protocol

Country Status (1)

Country Link
CN (1) CN111541544B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113300838A (en) * 2021-04-30 2021-08-24 西北大学 Double-field quantum digital signature method based on discrete phase random source
CN113572606A (en) * 2021-07-30 2021-10-29 矩阵时光数字科技有限公司 Quantum digital signature system and method based on Gaussian modulation and homodyne detection
CN113645038A (en) * 2021-07-30 2021-11-12 矩阵时光数字科技有限公司 Measuring equipment-independent quantum digital signature system and method
CN114254284A (en) * 2022-02-28 2022-03-29 南京大学 Digital certificate generation and identity authentication method and quantum CA authentication center and system
CN114745129A (en) * 2022-03-31 2022-07-12 南京邮电大学 Reference system independent quantum digital signature method
CN116208244A (en) * 2023-04-26 2023-06-02 军事科学院系统工程研究院网络信息研究所 Ultra-long distance optical fiber link monitoring method based on double-field quantum interference

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395367A (en) * 2017-08-08 2017-11-24 三峡大学 A kind of group ranking system based on quantum key
CN110086614A (en) * 2019-05-05 2019-08-02 南京邮电大学 A kind of Quantum Digital Signature Research method using label single-photon source
CN110493010A (en) * 2019-09-24 2019-11-22 南京邮电大学 Mailing system and receiving/transmission method based on Quantum Digital Signature Research

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395367A (en) * 2017-08-08 2017-11-24 三峡大学 A kind of group ranking system based on quantum key
CN110086614A (en) * 2019-05-05 2019-08-02 南京邮电大学 A kind of Quantum Digital Signature Research method using label single-photon source
CN110493010A (en) * 2019-09-24 2019-11-22 南京邮电大学 Mailing system and receiving/transmission method based on Quantum Digital Signature Research

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIN LU等: ""Quantum digital signature based on quantum one-way functions", 《THE 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY》 *
XIN LU等: ""Quantum digital signature based on quantum one-way functions", 《THE 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY》, 11 July 2005 (2005-07-11) *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113300838A (en) * 2021-04-30 2021-08-24 西北大学 Double-field quantum digital signature method based on discrete phase random source
CN113572606A (en) * 2021-07-30 2021-10-29 矩阵时光数字科技有限公司 Quantum digital signature system and method based on Gaussian modulation and homodyne detection
CN113645038A (en) * 2021-07-30 2021-11-12 矩阵时光数字科技有限公司 Measuring equipment-independent quantum digital signature system and method
CN113645038B (en) * 2021-07-30 2023-07-11 矩阵时光数字科技有限公司 Quantum digital signature system and method irrelevant to measuring equipment
CN113572606B (en) * 2021-07-30 2023-08-22 矩阵时光数字科技有限公司 Quantum digital signature system and method based on Gaussian modulation and homodyne detection
CN114254284A (en) * 2022-02-28 2022-03-29 南京大学 Digital certificate generation and identity authentication method and quantum CA authentication center and system
CN114745129A (en) * 2022-03-31 2022-07-12 南京邮电大学 Reference system independent quantum digital signature method
CN114745129B (en) * 2022-03-31 2023-09-26 南京邮电大学 Reference system independent quantum digital signature method
CN116208244A (en) * 2023-04-26 2023-06-02 军事科学院系统工程研究院网络信息研究所 Ultra-long distance optical fiber link monitoring method based on double-field quantum interference
CN116208244B (en) * 2023-04-26 2023-08-08 中国人民解放军军事科学院系统工程研究院 Ultra-long distance optical fiber link monitoring method based on double-field quantum interference

Also Published As

Publication number Publication date
CN111541544B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN111541544A (en) Quantum digital signature method based on double-field protocol
US11533171B2 (en) Apparatus and method for quantum direct communication using single qubits
US11444757B2 (en) Quantum tokens
CN111447056B (en) Configurable decoy state quantum digital signature method
Kanukurthi et al. Key agreement from close secrets over unsecured channels
US10756889B2 (en) Certificated quantum cryptography system and method
CN111865599B (en) Single-decoy-state quantum digital signature method
CN110086614B (en) Quantum digital signature method using marked single photon source
US20210351936A1 (en) Qds-based mail system and transceiving method
CN115001704B (en) Four-intensity decoy state quantum digital signature method
CN114745129B (en) Reference system independent quantum digital signature method
Teja et al. Quantum cryptography: state-of-art, challenges and future perspectives
CN115276988B (en) Four-strength measuring equipment independent key distribution method
WO2023244105A1 (en) Segmented error correction for qkd post-processing
Qin et al. Efficient quantum digital signatures over long distances with likely bit strings
US20230370494A1 (en) Quantum secure direct communication with mutual authentication via rotation of an arbitrary basis
CN115021941A (en) Quantum digital signature method with state preparation error tolerance function
CN115643024A (en) Loss tolerance reference system independent quantum digital signature method
CN114268432B (en) Device-independent quantum secure direct communication method based on single photon source
CN113300838A (en) Double-field quantum digital signature method based on discrete phase random source
CN109039477B (en) Fault-tolerant quantum conversation method based on decoherence-free subspace
WO2018127693A1 (en) Future position commitment
Panja et al. A one-way secret key agreement with security against active adversaries
Sharifi et al. A simulative comparison of bb84 protocol with its improved version
RU2695050C1 (en) Method of generating an encryption/decryption key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Zhangjiagang Meimei Intelligent Sensing Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980046621

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231113

Application publication date: 20200814

Assignee: Zhangjiagang Xinliwei Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980046619

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231114

Application publication date: 20200814

Assignee: Nanjing Erxin Electronic Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980046617

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231113

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: NANJING YUANGAN MICROELECTRONIC CO.,LTD.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048124

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231127

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Nanjing Aiqi Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048488

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Haihe Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048485

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Xiaojiang Jiahu (Nanjing) Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048562

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231130

Application publication date: 20200814

Assignee: Xiaosu Accompanying Clinic (Nanjing) Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048561

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231130

Application publication date: 20200814

Assignee: Nanjing Youxin Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048560

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231130

Application publication date: 20200814

Assignee: Nanjing Zhimeng Rehabilitation Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048559

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231130

Application publication date: 20200814

Assignee: Qihe Technology (Nanjing) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048558

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231129

Application publication date: 20200814

Assignee: Shuangqing Doctor Group (Hainan) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048557

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231129

Application publication date: 20200814

Assignee: Shuangxin Internet Hospital (Hainan) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048554

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231129

Application publication date: 20200814

Assignee: Xixiayuan (Ningxia) Agricultural Development Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048553

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Tongyou Engineering Services Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048552

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing xinwindows Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048550

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Yangbang Enterprise Management Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048549

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Yixuntong Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048547

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Youda Medical Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048545

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Youda Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048541

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Hancai Electronics Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048538

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Hancai Optoelectronic Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048534

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Jianhai Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048527

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Qingyou Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048525

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Nanjing Shuangzi Zhitong Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048523

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: NANJING PENGYUDA INFORMATION TECHNOLOGY CO.,LTD.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048517

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Edge Intelligent Security Technology (Zhenjiang) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048515

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Edge Intelligence Research Institute Nanjing Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048511

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Huiyi IoT Technology (Zhenjiang) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048504

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

Application publication date: 20200814

Assignee: Jiangsu Hongyi Medical Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048500

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231128

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Deloitte (Jiangsu) Education Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049533

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Youqi Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049531

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Tuanyuan Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049522

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing fandilang Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049497

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Dingshan Technology Incubation (Nanjing) Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049483

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Jinxiang Experimental Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049478

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Baoxing Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049437

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Jiangsu Anbo Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049425

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Shihong Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049398

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Self Postal Transfer Technology Transfer Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049391

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Lvran Agricultural Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049370

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Huijue Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049366

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing jinshuxin Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049360

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Jingliheng Electronic Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049351

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Jiangsu Dixin Metrology Testing Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980049330

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231203

Application publication date: 20200814

Assignee: Nanjing Xinjia Network Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980048653

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231130

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Nanjing yist Packaging Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980050260

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231207

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Nanjing Sundeli Material Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051075

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231209

Application publication date: 20200814

Assignee: Nanjing Kaishenghui Construction Engineering Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051074

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231209

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Jiangsu Liebao Network Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052022

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231212

Application publication date: 20200814

Assignee: Jiangsu Chaoxin Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052021

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231212

Application publication date: 20200814

Assignee: Speed Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051704

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231212

Application publication date: 20200814

Assignee: Nanjing Zouma Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051703

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231212

Application publication date: 20200814

Assignee: Nanjing Heyue Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051698

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231212

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Jiangsu Zhongye Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052151

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231215

Application publication date: 20200814

Assignee: Hangzhou Yicui Information Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052106

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231215

Application publication date: 20200814

Assignee: Nanjing Shuhui Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052024

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231213

Application publication date: 20200814

Assignee: Nanjing Qinghong Network Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980052023

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231213

Application publication date: 20200814

Assignee: Nanjing Jianwu Electronic Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051905

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231213

Application publication date: 20200814

Assignee: NANJING TIANHUA ZHONGAN COMMUNICATION TECHNOLOGY Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980051887

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231213

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: Nanjing Fanyi Intelligent Technology Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980053773

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231223

Application publication date: 20200814

Assignee: NANJING HUADONG ELECTRONICS VACUUM MATERIAL Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980053414

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231222

Application publication date: 20200814

Assignee: NANJING DIXIN COORDINATE INFORMATION TECHNOLOGY CO.,LTD.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980053374

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231222

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200814

Assignee: NANJING CREATCOMM TECHNOLOGY CO.,LTD.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980054276

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231227

Application publication date: 20200814

Assignee: Jiangsu Quanyijia Electronic Commerce Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980054141

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231227

Application publication date: 20200814

Assignee: NANJING YIZHIHENG SOFTWARE TECHNOLOGY Co.,Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2023980054071

Denomination of invention: A Quantum Digital Signature Method Based on Dual Field Protocol

Granted publication date: 20230602

License type: Common License

Record date: 20231227